API Reference v2.0.0

Packages

  • pgd.k8s.enterprisedb.io/v1beta1

Package v1beta1 contains API Schema definitions for the pgd v1beta1 API group

Resource Types

Backup

Backup configures the backup of cnp-pgd nodes

Appears in:

FieldDescriptionRequiredDefaultValidation
configuration BackupConfigurationThe CNP configuration to be used for backup. ServerName value is reserved by the operator.
cron ScheduledBackupSpecThe scheduled backup for the data.
please use schedulers instead.
Deprecated: This field is deprecated, will be removed in future versions.
schedulers ScheduledBackupSpec arrayDefine schedulers for the backup. Each scheduler has a different backup method.
Only one of either backup.cron or backup.schedulers can be defined.

BackupStatus

BackupStatus contains the current status of the pgd backup

Appears in:

FieldDescriptionRequiredDefaultValidation
clusterName stringClusterName the elected cluster to take the backup, the backup could be scheduled with
different methods, but only one cluster will take the backup
scheduledBackupName stringScheduledBackupName is the name of the scheduled backup.
Deprecated: This field is deprecated, will be removed in future versions.
Please use ScheduledBackupStatus instead.
scheduledBackupHash stringScheduledBackupHash is the hash of the scheduled backup configuration.
Deprecated: This field is deprecated, will be removed in future versions.
Please use ScheduledBackupStatus instead.
scheduledBackups ScheduledBackupStatus arrayScheduledBackupStatus contains the status of all scheduled backups

BarmanCloudPluginStatus

BarmanCloudPluginStatus contains the status of the barman-cloud plugin

Appears in:

FieldDescriptionRequiredDefaultValidation
pluginEnabled booleanPluginEnabled is true when the barman cloud plugin is enabled
objectStore ObjectStoreStatus arrayObjectStore contains the name and hashcode of the managed objectStore

CNPStatus

CNPStatus contains any relevant status for the operator about CNP

Appears in:

FieldDescriptionRequiredDefaultValidation
dataInstances integer0
witnessInstances integer0
clusterStatus ClusterStatus arrayClusterStatus contains the list of the status of the CNP clusters
firstRecoverabilityPointsByMethod object (keys:string, values:RecoverabilityPointsByMethod)The recoverability points by method, keyed per CNP clusterName
Deprecated: This field is deprecated, will be removed in future versions.
firstRecoverabilityPoints object (keys:string, values:string)The recoverability points, keyed per CNP clusterName, as a date in RFC3339 format
Deprecated: This field is deprecated, will be removed in future versions.
superUserSecretIsPresent boolean
applicationUserSecretIsPresent boolean
podDisruptionBudgetIsPresent boolean

CatalogImage

CatalogImage defines the image and major version

Appears in:

FieldDescriptionRequiredDefaultValidation
image stringThe image referenceTrue
major integerThe PostgreSQL major version of the image. Must be unique within the catalog.TrueMinimum: 10

CertManagerTemplate

CertManagerTemplate contains the data to generate a certificate request

Appears in:

FieldDescriptionRequiredDefaultValidation
spec CertificateSpecThe Certificate object specification
metadata MetadataRefer to Kubernetes API documentation for fields of metadata.

ClientCertConfiguration

ClientCertConfiguration contains the information to generate the certificate for the streaming_replica user

Appears in:

FieldDescriptionRequiredDefaultValidation
caCertSecret stringCACertSecret is the secret of the CA to be injected into the CloudNativePG
ClientCASecret configuration
True
certManager CertManagerTemplateThe cert-manager template used to generate the certificates
preProvisioned ClientPreProvisionedCertificatesPreProvisioned contains how to fetch the pre-generated client certificates

ClientPreProvisionedCertificates

ClientPreProvisionedCertificates instruct how to fetch the pre-generated client certificates

Appears in:

FieldDescriptionRequiredDefaultValidation
streamingReplica PreProvisionedCertificateStreamingReplica the pre-generated certificate for 'streaming_replica' user

ClusterImageCatalog

ClusterImageCatalog is the Schema for the clusterimagecatalogs API

FieldDescriptionRequiredDefaultValidation
apiVersion stringpgd.k8s.enterprisedb.io/v1beta1True
kind stringClusterImageCatalogTrue
metadata ObjectMetaRefer to Kubernetes API documentation for fields of metadata.True
spec ImageCatalogSpecSpecification of the desired behavior of the ClusterImageCatalog.
More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#spec-and-status
True

ClusterStatus

ClusterStatus contains the current status of the CNP cluster

Appears in:

FieldDescriptionRequiredDefaultValidation
name stringName is the name of the CNP cluster
phase stringPhase is the current phase of the CNP cluster
klioClientCertIsReady booleanKlioClientCertIsReady indicates if the Klio client certificate is ready when Kilo plugin is used

CnpBaseConfiguration

CnpBaseConfiguration contains the configuration parameters that can be applied to both CNP Witness and Data nodes

Appears in:

FieldDescriptionRequiredDefaultValidation
startDelay integerThe time in seconds that is allowed for a PostgreSQL instance to
successfully start up (default 3600)
3600
stopDelay integerThe time in seconds that is allowed for a PostgreSQL instance node to
gracefully shutdown (default 180)
180
smartShutdownTimeout integerThe time in seconds that controls the window of time reserved for the smart shutdown of Postgres to complete.
Make sure you reserve enough time for the operator to request a fast shutdown of Postgres
(that is: stopDelay - smartShutdownTimeout).
15
storage StorageConfigurationConfiguration of the storage of the instancesTrue
walStorage StorageConfigurationConfiguration of the WAL storage for the instances
clusterMaxStartDelay integerThe time in seconds that is allowed for a PostgreSQL instance to
successfully start up (default 300)
300
affinity AffinityConfigurationAffinity/Anti-affinity rules for Pods
resources ResourceRequirementsResources requirements of every generated Pod. Please refer to
https://kubernetes.io/docs/concepts/configuration/manage-resources-containers/
for more information.
postgresql PostgresConfigurationConfiguration of the PostgreSQL server
monitoring MonitoringConfigurationThe configuration of the monitoring infrastructure of this cluster
logLevel stringThe instances' log level, one of the following values: error, warning, info (default), debug, traceinfoEnum: [error warning info debug trace]
serviceAccountTemplate ServiceAccountTemplateThe service account template to be passed to CNP
postInitSQL string arrayList of SQL queries to be executed as a superuser immediately
after a node has been created - to be used with extreme care
(by default empty)
postInitTemplateSQL string arrayList of SQL queries to be executed as a superuser in the template1
after a node has been created - to be used with extreme care
(by default empty)
postInitApplicationSQL string arrayList of SQL queries to be executed as a superuser in the application
database right after the cluster has been created - to be used with extreme care
as any data created in application database before logical join will cause the join to fail
(by default empty)
postInitApplicationSQLRefs SQLRefsList of references to ConfigMaps or Secrets containing SQL files
to be executed as a superuser in the application database right after
the cluster has been created. The references are processed in a specific order:
first, all Secrets are processed, followed by all ConfigMaps.
Within each group, the processing order follows the sequence specified
in their respective arrays. - to be used with extreme care
(by default empty)
postInitTemplateSQLRefs SQLRefsList of references to ConfigMaps or Secrets containing SQL files
to be executed as a superuser in the template1 database right after
the cluster has been created. The references are processed in a specific order:
first, all Secrets are processed, followed by all ConfigMaps.
Within each group, the processing order follows the sequence specified
in their respective arrays. - to be used with extreme care
(by default empty)
postInitSQLRefs SQLRefsList of references to ConfigMaps or Secrets containing SQL files
to be executed as a superuser in the postgres database right after
the cluster has been created. The references are processed in a specific order:
first, all Secrets are processed, followed by all ConfigMaps.
Within each group, the processing order follows the sequence specified
in their respective arrays. - to be used with extreme care
(by default empty)
seccompProfile SeccompProfileThe SeccompProfile applied to every Pod and Container.
Defaults to: RuntimeDefault
metadata InheritedMetadataRefer to Kubernetes API documentation for fields of metadata.
managed ManagedConfigurationThe configuration that is used by the portions of PostgreSQL that are managed by the CNP instance manager
projectedVolumeTemplate ProjectedVolumeSourceTemplate to be used to define projected volumes, projected volumes will be mounted
under /projected base folder
tablespaces TablespaceConfiguration arrayThe tablespaces configuration
topologySpreadConstraints TopologySpreadConstraint arrayTopologySpreadConstraints specifies how to spread matching pods among the given topology.
More info:
https://kubernetes.io/docs/concepts/scheduling-eviction/topology-spread-constraints/
plugins PluginConfiguration arrayThe plugins configuration, containing
any plugin to be loaded with the corresponding configuration
initDBOptions InitDBOptionsInitDBOptions specifies the options to be passed to the initdb command
when the node is created from scratch
env EnvVar arrayEnv follows the Env format to pass environment variables
to the pods created in the PG4K cluster
envFrom EnvFromSource arrayEnvFrom follows the EnvFrom format to pass environment variables
sources to the pods to be used by Env

CnpConfiguration

CnpConfiguration contains the configurations of the data nodes that will be injected into the resulting clusters composing the PGD group

Appears in:

FieldDescriptionRequiredDefaultValidation
startDelay integerThe time in seconds that is allowed for a PostgreSQL instance to
successfully start up (default 3600)
3600
stopDelay integerThe time in seconds that is allowed for a PostgreSQL instance node to
gracefully shutdown (default 180)
180
smartShutdownTimeout integerThe time in seconds that controls the window of time reserved for the smart shutdown of Postgres to complete.
Make sure you reserve enough time for the operator to request a fast shutdown of Postgres
(that is: stopDelay - smartShutdownTimeout).
15
storage StorageConfigurationConfiguration of the storage of the instancesTrue
walStorage StorageConfigurationConfiguration of the WAL storage for the instances
clusterMaxStartDelay integerThe time in seconds that is allowed for a PostgreSQL instance to
successfully start up (default 300)
300
affinity AffinityConfigurationAffinity/Anti-affinity rules for Pods
resources ResourceRequirementsResources requirements of every generated Pod. Please refer to
https://kubernetes.io/docs/concepts/configuration/manage-resources-containers/
for more information.
postgresql PostgresConfigurationConfiguration of the PostgreSQL server
monitoring MonitoringConfigurationThe configuration of the monitoring infrastructure of this cluster
logLevel stringThe instances' log level, one of the following values: error, warning, info (default), debug, traceinfoEnum: [error warning info debug trace]
serviceAccountTemplate ServiceAccountTemplateThe service account template to be passed to CNP
postInitSQL string arrayList of SQL queries to be executed as a superuser immediately
after a node has been created - to be used with extreme care
(by default empty)
postInitTemplateSQL string arrayList of SQL queries to be executed as a superuser in the template1
after a node has been created - to be used with extreme care
(by default empty)
postInitApplicationSQL string arrayList of SQL queries to be executed as a superuser in the application
database right after the cluster has been created - to be used with extreme care
as any data created in application database before logical join will cause the join to fail
(by default empty)
postInitApplicationSQLRefs SQLRefsList of references to ConfigMaps or Secrets containing SQL files
to be executed as a superuser in the application database right after
the cluster has been created. The references are processed in a specific order:
first, all Secrets are processed, followed by all ConfigMaps.
Within each group, the processing order follows the sequence specified
in their respective arrays. - to be used with extreme care
(by default empty)
postInitTemplateSQLRefs SQLRefsList of references to ConfigMaps or Secrets containing SQL files
to be executed as a superuser in the template1 database right after
the cluster has been created. The references are processed in a specific order:
first, all Secrets are processed, followed by all ConfigMaps.
Within each group, the processing order follows the sequence specified
in their respective arrays. - to be used with extreme care
(by default empty)
postInitSQLRefs SQLRefsList of references to ConfigMaps or Secrets containing SQL files
to be executed as a superuser in the postgres database right after
the cluster has been created. The references are processed in a specific order:
first, all Secrets are processed, followed by all ConfigMaps.
Within each group, the processing order follows the sequence specified
in their respective arrays. - to be used with extreme care
(by default empty)
seccompProfile SeccompProfileThe SeccompProfile applied to every Pod and Container.
Defaults to: RuntimeDefault
metadata InheritedMetadataRefer to Kubernetes API documentation for fields of metadata.
managed ManagedConfigurationThe configuration that is used by the portions of PostgreSQL that are managed by the CNP instance manager
projectedVolumeTemplate ProjectedVolumeSourceTemplate to be used to define projected volumes, projected volumes will be mounted
under /projected base folder
tablespaces TablespaceConfiguration arrayThe tablespaces configuration
topologySpreadConstraints TopologySpreadConstraint arrayTopologySpreadConstraints specifies how to spread matching pods among the given topology.
More info:
https://kubernetes.io/docs/concepts/scheduling-eviction/topology-spread-constraints/
plugins PluginConfiguration arrayThe plugins configuration, containing
any plugin to be loaded with the corresponding configuration
initDBOptions InitDBOptionsInitDBOptions specifies the options to be passed to the initdb command
when the node is created from scratch
env EnvVar arrayEnv follows the Env format to pass environment variables
to the pods created in the PG4K cluster
envFrom EnvFromSource arrayEnvFrom follows the EnvFrom format to pass environment variables
sources to the pods to be used by Env
postgresUID integerThe UID of the postgres user inside the image, defaults to 26.
This value is used for the CNP clusters created by this PGDGroup.
This field is immutable after PGDGroup creation.
26
postgresGID integerThe GID of the postgres user inside the image, defaults to 26.
This value is used for the CNP clusters created by this PGDGroup.
This field is immutable after PGDGroup creation.
26
joinMethod JoinMethodJoinMethod specifies the method data nodes will use to join the local group.
This field applies only to data groups (groups with spec.instances > 0 ).
For witness groups, this field is ignored.
PGD supports two ways of joining a local group: logical and physical.
In logical join,
the node will join the group by using bdr.join_node_group, synchronizing data from scratch.
In physical join
the node will join the group by using bdr_init_physical, synchronizing data from a physical backup.
physicalEnum: [logical physical]
enableSuperuserAccess booleanWhen this option is enabled, the CNP operator will create or use the secret defined
in the SuperuserSecret to allow superuser (postgres) access to the database.
When this option is disabled on a running Group, the operator will ignore the content
of the secret and set the password of the postgres user to NULL.
Enabled by default.
true
superuserSecret LocalObjectReferenceThe secret containing the superuser password.
A new secret will be created with a randomly generated password if not defined.
This field is only allowed in the CNP Instances configuration.
A Witness Node will always use the same SuperuserSecret as the other instances.
klio KlioConfigKlio is used to generate resources required by connecting to Klio

ConnMgrStatus

ConnMgrStatus contains any relevant status for connection manager

Appears in:

FieldDescriptionRequiredDefaultValidation
nodeName stringNodeName is the name of the node in the PGD group
isLive booleanIsLive is the result of the /connection/is-live probe
isReady booleanIsReady is the result of the /connection/is-ready probe
useHTTPS booleanUseHTTPS indicates whether HTTPS is used during detecting

ConnectionString

Underlying type: object

ConnectionString represent the parameters to connect to a PostgreSQL cluster

Appears in:

ConnectivityConfiguration

ConnectivityConfiguration describes how to generate the services and certificates for the PGDGroup

Appears in:

FieldDescriptionRequiredDefaultValidation
dns RootDNSConfigurationDescribes how the FQDN for the resources should be generated
tls TLSConfigurationThe configuration of the TLS infrastructureTrue
nodeServiceTemplate ServiceTemplateInstructs how to generate the service for each node
groupServiceTemplate ServiceTemplateInstructs how to generate the service for the PGDGroup
proxyServiceTemplate ServiceTemplateInstructs how to generate the service pointing to the connection manager read-write port which routing to
write leader
proxyReadServiceTemplate ServiceTemplateInstructs how to generate the service pointing to the connection manager read-only port
which routing to read-only nodes

ConnectivityStatus

ConnectivityStatus contains any relevant status for the operator about Connectivity

Appears in:

FieldDescriptionRequiredDefaultValidation
replicationTLSCertificate ReplicationCertificateStatusReplicationTLSCertificate is the name of the replication TLS certificate, if we have it
nodeTLSCertificates NodeCertificateStatus arrayNodeTLSCertificates are the names of the certificates that have been created for the PGD nodes
unusedCertificates string arrayUnusedCertificates are the names of the certificates that we don't use anymore
for the PGD nodes
nodesWithoutCertificates string arrayNodesWithoutCertificates are the names of the nodes which have not a server certificate
nodesNeedingServiceReconciliation string arrayNodesNeedingServiceReconciliation are the names of the nodes which have not a server certificate
configurationHash stringConfigurationHash is the hash code of the connectivity configuration, used to
check if we had a change in the configuration or not

DNSConfiguration

DNSConfiguration describes how the FQDN for the resources should be generated

Appears in:

FieldDescriptionRequiredDefaultValidation
domain stringContains the domain name of by all services in the PGDGroup. It is responsibility of the user to ensure that the
value specified here matches with the rendered nodeServiceTemplate and groupServiceTemplate
hostSuffix stringContains an optional suffix to add to all the service names in the PGDGroup. The meaning of this setting it to
allow the user to easily mark all the services created in a location for routing purpose
(i.e., add a generic rule to CoreDNS to rewrite some service suffixes as local)

DiscoveryJobConfig

DiscoveryJobConfig contains a series of fields that configure the discovery job

Appears in:

FieldDescriptionRequiredDefaultValidation
delay integerDelay amount of time to sleep between retries, measured in seconds10
retries integerRetries how many times the operation should be retried30
timeout integerTimeout amount of time given to the operation to succeed, measured in seconds300

ImageCatalog

ImageCatalog is the Schema for the imagecatalogs API

FieldDescriptionRequiredDefaultValidation
apiVersion stringpgd.k8s.enterprisedb.io/v1beta1True
kind stringImageCatalogTrue
metadata ObjectMetaRefer to Kubernetes API documentation for fields of metadata.True
spec ImageCatalogSpecSpecification of the desired behavior of the ImageCatalog.
More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#spec-and-status
True

ImageCatalogRef

ImageCatalogRef defines the referenced ImageCatalog and the referenced major Postgres version

Appears in:

FieldDescriptionRequiredDefaultValidation
apiGroup stringAPIGroup is the group for the resource being referenced.
If APIGroup is not specified, the specified Kind must be in the core API group.
For any other third-party types, APIGroup is required.
kind stringKind is the type of resource being referencedTrue
name stringName is the name of resource being referencedTrue
major integerThe major version of PostgreSQL we want to use from the ImageCatalogTrue

ImageCatalogSpec

ImageCatalogSpec defines the desired ImageCatalog

Appears in:

FieldDescriptionRequiredDefaultValidation
pgdImages CatalogImage arrayList of CatalogImages available in the catalogTrueMaxItems: 8
MinItems: 1
proxyImage stringProxyImage The proxy image available in the catalog
Starting from PGD 6, the embedded connection manager replaces the external proxy.
Deprecated: This field is deprecated, will be removed in future versions.

ImageStatus

ImageStatus defines the current used images

Appears in:

FieldDescriptionRequiredDefaultValidation
pgd stringPGD is the current used pgd image

InheritedMetadata

InheritedMetadata contains metadata to be inherited by all resources related to a Cluster

Appears in:

FieldDescriptionRequiredDefaultValidation
labels object (keys:string, values:string)
annotations object (keys:string, values:string)

InitDBOptions

InitDBOptions contain options for nodes start with initDB

Appears in:

FieldDescriptionRequiredDefaultValidation
dataChecksums booleanWhether the -k option should be passed to initdb,
enabling checksums on data pages (default: false)
encoding stringThe value to be passed as option --encoding for initdb (default:UTF8)
localeCollate stringThe value to be passed as option --lc-collate for initdb (default:C)
localeCType stringThe value to be passed as option --lc-ctype for initdb (default:C)
locale stringSets the default collation order and character classification in the new database.
localeProvider stringThis option sets the locale provider for databases created in the new cluster.
Available from PostgreSQL 16.
icuLocale stringSpecifies the ICU locale when the ICU provider is used.
This option requires localeProvider to be set to icu.
Available from PostgreSQL 15.
icuRules stringSpecifies additional collation rules to customize the behavior of the default collation.
This option requires localeProvider to be set to icu.
Available from PostgreSQL 16.
builtinLocale stringSpecifies the locale name when the builtin provider is used.
This option requires localeProvider to be set to builtin.
Available from PostgreSQL 17.
walSegmentSize integerThe value in megabytes (1 to 1024) to be passed to the --wal-segsize
option for initdb (default: empty, resulting in PostgreSQL default: 16MB)
Maximum: 1024
Minimum: 1

JoinMethod

Underlying type: string

JoinMethod represents one of the supported methods of joining a node

Appears in:

FieldDescription
physicalJoinMethodPhysical represents the use of physical join
logicalJoinMethodLogical represents the use of logical join

KlioCertStatus

KlioCertStatus contains the status of a Certificate used by klio Plugin

Appears in:

FieldDescriptionRequiredDefaultValidation
name string
cluster string
isReady boolean

KlioConfig

KlioConfig defines the Klio related objects templates

Appears in:

FieldDescriptionRequiredDefaultValidation
pluginConfigTemplate KlioPluginConfigTemplatePluginConfigTemplate defines the Klio plugin configuration templateTrue
clientCertTemplate CertManagerTemplateClientCertTemplate defines the Klio client certificate templateTrue

KlioConfigurationStatus

KlioConfigurationStatus contains the status of a klio PluginConfiguration

Appears in:

FieldDescriptionRequiredDefaultValidation
name string
cluster string

KlioPluginConfigTemplate

KlioPluginConfigTemplate contains the data to generate a certificate request

Appears in:

FieldDescriptionRequiredDefaultValidation
spec PluginConfigurationSpecPluginConfigurationSpec defines the plugin configuration specTrue
metadata MetadataRefer to Kubernetes API documentation for fields of metadata.

KlioPluginStatus

KlioPluginStatus contains the status of the klio plugin

Appears in:

FieldDescriptionRequiredDefaultValidation
serverTLSSecretIsPresent booleanServerTLSSecretIsPresent indicates if the server TLS secret is present
certificates KlioCertStatus arrayClientCertificates contains the status of the klio client certificates
certificateHash stringClientCertificateHash contains the hash of the client certificates
pluginConfigurations KlioConfigurationStatus arrayPluginConfigurations contains the status of the klio PluginConfigurations
pluginConfigurationHash stringPluginConfigurationHash contains the hash of the plugin configurations

Metadata

Metadata is a structure similar to the metav1.ObjectMeta, but still parseable by controller-gen to create a suitable CRD for the user.

Appears in:

FieldDescriptionRequiredDefaultValidation
labels object (keys:string, values:string)Map of string keys and values that can be used to organize and categorize
(scope and select) objects. May match selectors of replication controllers
and services.
More info: http://kubernetes.io/docs/user-guide/labels
annotations object (keys:string, values:string)Annotations is an unstructured key value map stored with a resource that may be
set by external tools to store and retrieve arbitrary metadata. They are not
queryable and should be preserved when modifying objects.
More info: http://kubernetes.io/docs/user-guide/annotations

NodeCertificateStatus

NodeCertificateStatus encapsulate the status of the server certificate of a CNP node

Appears in:

FieldDescriptionRequiredDefaultValidation
name stringName is the name of the certificate
hash stringHash is the hash of the configuration for which it has been generated
isReady booleanReady is true when the certificate is ready
preProvisioned booleanPreProvisioned is true if the certificate is preProvisioned
nodeName stringNodeName is the name of the CNP cluster using this certificateTrue

NodeExtensionStatus

NodeExtensionStatus show the status of the node

Appears in:

  • NodesExtensionsStatus
FieldDescriptionRequiredDefaultValidation
Name stringName of the nodeTrue
NeedBdrInstallation booleanNeedBdrInstallation true if the node does not have the BDR extension installedTrue
NeedJoin booleanNeedJoin true if the node need join the groupTrue
Parted booleanParted true if the node is already partedTrue
Error stringError is populated if any error is encountered during the PGD discovery executionTrue
BdrExtensionVersion stringBdrExtensionVersion VersionTrue

NodeKindName

Underlying type: string

NodeKindName is a type containing the potential values of node_kind_name from bdr.node_summary

Appears in:

FieldDescription
witness
data

NodeSummary

NodeSummary shows relevant info from bdr.node_summary

Appears in:

FieldDescriptionRequiredDefaultValidation
node_name stringName of the node
node_group_name stringNodeGroupName is the name of the joined group
peer_state_name stringConsistent state of the node in human-readable form
peer_target_state_name stringState which the node is trying to reach (during join or promotion)
node_kind_name NodeKindNameThe kind of node: witness or data

ObjectStoreStatus

ObjectStoreStatus contains the name and hash of the objectStore

Appears in:

FieldDescriptionRequiredDefaultValidation
name stringName is the name of the objectStore
hash stringHash stored the objectStore hashcode

OperatorPhase

Underlying type: string

OperatorPhase it represents a phase of the PGDGroup controller

Appears in:

FieldDescription
PGDGroup - HealthyPhaseHealthy triggers when no other phase condition is met
PGDGroup - PausedPhasePaused triggers when the PGDGroup is paused and all instances and proxies pod are deleted
PGDGroup - PartedPhaseParted triggers when the all nodes of the pgdgroup are parted
PGDGroup - Waiting for nodes to be readyPhaseWaitingForNodesToBeReady triggers when a PGDGroup node is not in status ready
PGDGroup - Waiting for nodes major version in-place upgradePhaseWaitingForNodesInPlaceUpgrade is the phase where a in-place major version upgrade (postgres, bdr, etc)
is happening
PGDGroup - All nodes have been droppedPhaseAllNodesDropped is the phase that all nodes in the group has been dropped, group can not be recovered anymore
PGDGroup - Unable to detect a phase for the PGD groupPhaseUnableToDetectPhase triggers when a PGDGroup phase cannot be calculated. This is a programmatic error
PGDGroup - Image Catalog Not FoundPhaseCatalogNotFound triggers when the ImageCatalog is used but not found
PGDGroup - Major Version Not Found in Image CatalogPhaseMajorVersionNotFound triggers when major version can not be found in the referenced ImageCatalog
PGDGroup - Application user secret not foundPhaseErrorFindingApplicationSecret application secrets is defined by external but can not find
Finalizers - Adding FinalizersPhaseAddingFinalizers add the missing finalizer to group
Finalizers - Removing FinalizersPhaseRemovingFinalizers remove finalizer if not needed
Pause - pause nodesPhasePauseNode operator is pausing the nodes
Pause - waiting for nodesPhasePauseWaitingNode operator is waiting for node pause or resume
Pause - resume nodesPhaseResumeNode operator is resume nodes
Connectivity - Certificates - Create replication certificatePhaseCreateReplicationCertificate triggers when replication certificate secret (per group) is not created
Connectivity - Certificates - Reconcile replication certificatePhaseReconcileReplicationCertificate triggers when hash changed and replication certificate secret need reconcile
Connectivity - Certificates - Create server certificatesPhaseCreateServerCertificates triggers when server certificate secret (per node) is not created
Connectivity - Certificates - Delete server certificatesPhaseDeleteServerCertificates triggers to delete orphan server certificates
Connectivity - Certificates - Reconcile server certificatesPhaseReconcileServerCertificates triggers to reconciles server certificates
Connectivity - Certificates - Waiting for the certificates to be readyPhaseWaitCertificateToBeReady waiting for certificates to be ready
nolint lll
Connectivity - Service - Reconciling connection manager servicePhaseReconcileConnMgrService triggers when the application read-write service (<group name>-proxy)
is not ready or need patch
Connectivity - Service - Reconciling connection manager read servicePhaseReconcileConnMgrReadService triggers when the application read-only service (<group name>-proxy-r)
is not ready or need patch
Connectivity - Service - Reconciling node servicesPhaseReconcileNodeServices triggers when the node service (<group name>-<sequence>-node) is not ready
or need patch
Connectivity - Service - Reconciling group servicePhaseReconcileGroupService triggers when the group service (<group name>-group) is not ready or need patch
Secrets - reconciling pull secretsPhaseReconcilePullSecrets is the phase that generates the secrets that are made available
by the various PGDGroup resources
ObjectStore - Reconciling objectStorePhaseReconcileObjectStore is phase where we reconcile the managed objectstore cr
ObjectStore - Deleting unused objectstorePhaseDeleteObjectStore is phase where we delete the managed objectstore cr
BOOTSTRAP - Selecting a target node for remote join PhaseCreatingRemoteJoinJob creating bootstrap job to find proper nodes to remote join
BOOTSTRAP - Selecting server to be restoredPhaseCreatingRestoreJob creating bootstrap job to find proper server to restore
BOOTSTRAP - Selecting volume snapshots to be restoredPhaseCreatingSnapshotRestoreJob creating bootstrap job to find volume snapshot to restore
BOOTSTRAP - Waiting for target node selectionPhaseWaitingForTargetNodeSelection triggers when remote job bootstrap job is running, waiting for
it to select the proper node for the remote join
BOOTSTRAP - Waiting for volume snapshots selectionPhaseWaitingForSnapshotsSelection triggers when restore from volumesnapshot bootstrap job is running
BOOTSTRAP - Waiting for server selectionPhaseWaitingForRestoreServerSelection triggers when restore from barman backup bootstrap job is running
waiting for the job selecting the server to restore from
BOOTSTRAP - Failed to run the bootstrap jobPhaseFailedBootstrapJob is an error phase, when bootstrap job running failed
Nodes - Bootstrapping requirementsPhaseBootstrapNodeRequirements is the preliminary phase that precedes the creation of PGD node
Nodes - Reconciling First Recoverability PointsPhaseFirstRecoverabilityReconcile is the phase to update the first recoverability points of the node
Nodes - Reconciling NodesPhaseReconcile triggers when the changes in pgdgroup need to be propagated to nodes
Nodes - Scaling up the group sizePhaseScaleUpGroupSize triggers when there the number of existing clusters is different from the requested instances.
Nodes - Scaling down parted nodesPhaseScaleDownPartedNodes removes the parted CNP clusters
Nodes - Error finding node to physical join in current group PhaseErrorFindingTargetNode is an error phase, where we failed to find the target node to do the physical join
for the non-first node in a group
BACKUP - Assign nodePhaseAssignBackupNode triggers when PGDGroup is healthy and there is no backup node elected and assigned
BACKUP - Switch nodePhaseAssignBackupNode triggers when the previous backup node is not existed
BACKUP - Reconciling Scheduled backupPhaseReconcileScheduledBackup triggers when scheduled backup changed
BACKUP - Deleting Scheduled backupPhaseDeleteScheduledBackup triggers when orphan scheduled backup found, usually happened when backup method changed.
Klio - Reconciling klio resourcesPhaseCreateKlioResources creates the klio resources
Klio - Deleting resourcesPhaseDeleteKlioResources deletes the klio resources
Klio - Certificates - Missing klio serverTLSSecretPhaseMissingKlioServerTLSSecret missing the klio serverTLSSecret in klio configuration
Klio - Certificates - Waiting for the certificates to be readyPhaseWaitingKlioResourceToBeReady waits for klio resources to be ready
PGD - Delete node discoveryPhaseDeleteNodeDiscovery delete the node discovery job which is not needed
PGD - Start node discoveryPhaseStartNodeDiscovery start the node discovery, this is running
PGD - Waiting for node discoveryPhaseWaitingForNodeDiscovery waiting for the node defined in discovery ready
PGD - Node discovery failedPhaseFailedNodeDiscovery is an error phase, when the discovery job is failed, delete the job to
restart the discovery
PGD - Invalid discovery configurationPhaseInvalidDiscoveryConfiguration is an error phase, when there is invalid configuration
in discovery section
PGD - Bootstrapping and joining groupPhaseBootstrappingAndJoiningPGD is creating the first node of the pgdgroup with
pgdGroup.Spec.Pgd.ParentGroup.Create set to true
PGD - Cleaning metadata leftovers from restorePhaseCleanDirtyNodes triggers is creating the first node of the pgdgroup which is restored from backup
PGD - Install PGD extensionsPhaseInstallExtensions to create PGD extension in the pgd node
PGD - Node is syncing with PGDGroupPhaseSync triggers if a PGD node is trying to reach a different target state
PGD - Waiting to discover an active PGD node to logical joinPhaseWaitActiveDataNode triggers when there is no active node in the pgdgroup for logical join
PGD - Joining node into groupPhaseJoinPGDGroup node is logical join the target node
PGD - Parting node from groupPhaseNodesPartingPGDGroup operator is parting nodes from the pgdgroup, usually happened
after scale down or user request to part the group using annotations
PGD - Parting missing nodesPhasePartMissingNodes triggers when node is available but cluster is removed from kuberneters
PGD - Global raft consensus criticalPhaseGlobalRaftConsensusCritical triggers when the global raft of the pgdgroup is not consensus
PGD - Transfer Write LeadPhaseTransferWriteLead triggers when operator reconcile the writelead node and need a restart
PGD - All nodes have been partedPhaseAllNodeParted all nodes in the group has been parted, this maybe triggered by manually parting from pgdgroup
PGD - Error while discovering nodes status PhaseErrorDiscoveringNodeStatus is an error phase, when there is error occurred when detecting
the pgd node status
PGD - Prepare physical joinPhasePrePhysicalJoin triggers when creating a new node in pgdgroup, evaluate if the node
is ready to use physical join to join the group. Once the node is ready, will annotate the node
with physicalJoinState=started
PGD - Waiting for pre-physical join workPhaseWaitingPrePhysicalJoin wating for the node ready for physical join
PGD - Performing the physical joinPhasePhysicalJoin the node is performing the physical join
PGD - Waiting for physical joinPhaseWaitingPhysicalJoin waiting for the physical join to complete
PGD - Post physical joinPhasePostPhysicalJoin promote the node to primary cluster after physical join
PGD - Waiting for post-physical join workPhaseWaitingPostPhysicalJoin waiting for post physical join work to complete
PGD - Waiting for global raft consensusPhaseWaitForGlobalRaftConsensus triggers when the global raft is not consensus
PGD - Failed in physical join jobPhaseFailedPhysicalJoin is an error phase, triggers when the physical join job failed to run, delete
the job to restart the physical join
PGD - Reconciling node group configurationPhaseReconcileNodeGroupConfig reconcile the node group settings
PGD - Waiting for write lead electionPhaseWaitingForWriteLeadElection waiting for the writelead election
PGD - Applying SQL mutations of type AlwaysPhaseApplyAlwaysMutations triggers when applying the always mutations
PGD - Applying SQL mutations of type BootstrapPhaseApplyBootstrapMutations triggers when applying the bootstrap mutations
PGD - Applying SQL mutations of type WriteLeaderPhaseApplyWriteLeaderMutations triggers when applying the writeLead mutations
PGD - Reconcile application userPhaseReconcileApplicationUser reconcile the user password defined in owner secrets
PGD - Reconcile Managed RolePhaseReconcileManagedRole is the phase that indicates that the reconciler is reconciling the roles
PGD - Waiting for Connection Manager to be readyPhaseWaitingForConnMgrToBeReady waits for the connection manager to be ready by
checking its liveness and readiness probes
Migration - Waiting for operand image upgrade to PGD-6PhaseWaitingForUpgradeToPGD6 triggers when waiting for the upgrade to PGD 6
Migration - Cleanup of legacy resourcesPhaseCleanupLegacy triggers when cleaning up legacy resources
Default Metrics - Reconcile ResourcesPhaseDefaultMetricsReconcileResources triggers when resources need to be created or updated

OperatorPhaseCleanup

Underlying type: string

OperatorPhaseCleanup it represents a phase of the PGDGroupCleanup controller

Appears in:

FieldDescription
PGDGroupCleanup - No reliable node found in the executor PGDGroup
PGDGroupCleanup - Completed
PGDGroupCleanup - Parting the nodes
PGDGroupCleanup - Removing the PGDGroup
PGDGroupCleanup - Waiting for nodes in target PGDGroup to be parted

PGDGroup

PGDGroup is the Schema for the pgdgroups API

FieldDescriptionRequiredDefaultValidation
apiVersion stringpgd.k8s.enterprisedb.io/v1beta1True
kind stringPGDGroupTrue
metadata ObjectMetaRefer to Kubernetes API documentation for fields of metadata.
spec PGDGroupSpecTrue
status PGDGroupStatus

PGDGroupCleanup

PGDGroupCleanup is the Schema for the pgdgroupcleanups API

FieldDescriptionRequiredDefaultValidation
apiVersion stringpgd.k8s.enterprisedb.io/v1beta1True
kind stringPGDGroupCleanupTrue
metadata ObjectMetaRefer to Kubernetes API documentation for fields of metadata.True
spec PGDGroupCleanupSpecTrue
status PGDGroupCleanupStatusTrue

PGDGroupCleanupSpec

PGDGroupCleanupSpec defines the desired state of PGDGroupCleanup

Appears in:

FieldDescriptionRequiredDefaultValidation
executor stringTrue
target stringTrue
force booleanForce will force the removal of the PGDGroup even if the target PGDGroup nodes are not partedfalse

PGDGroupCleanupStatus

PGDGroupCleanupStatus defines the observed state of PGDGroupCleanup

Appears in:

FieldDescriptionRequiredDefaultValidation
phase OperatorPhaseCleanupPhase the phase of current cleanup cr
nodesToPart string arrayNodesToPart shows nodes that are not parted in the target group
isNodeGroupExists booleanIsNodeGroupExists indicates if the target group is still not dropped yet

PGDGroupSpec

PGDGroupSpec defines the desired state of PGDGroup

Appears in:

FieldDescriptionRequiredDefaultValidation
imageName stringName of the container image, supporting both tags (<image>:<tag>)
and digests for deterministic and repeatable deployments
(<image>:<tag>@sha256:<digestValue>)
imageCatalogRef ImageCatalogRefDefines the referenced ImageCatalog and the referenced major Postgres version
imagePullPolicy PullPolicyImage pull policy.
One of Always, Never or IfNotPresent.
If not defined, it defaults to IfNotPresent.
Cannot be updated.
More info: https://kubernetes.io/docs/concepts/containers/images#updating-images
IfNotPresent
imagePullSecrets LocalObjectReference arrayThe list of pull secrets to be used to pull operator and or the operand images
inheritedMetadata InheritedMetadataMetadata that will be inherited by all objects related to the pgdGroup
instances integerNumber of instances required in the clusterTrue0Minimum: 0
proxyInstances integerDeprecated: This field is deprecated, will be removed in future versions.0
witnessInstances integerNumber of witness instances required in the cluster0Minimum: 0
backup BackupThe configuration to be used for backups in the
CNP instances.
restore RestoreThe configuration to restore this PGD group from an Object Store
service
cnp CnpConfigurationDataInstances configuration that will be injected into the CNP
clusters that compose the PGD Group
True
witness CnpBaseConfigurationWitnessInstances configuration that will be injected into
the WitnessInstances CNP clusters
If not defined, it will default to the DataInstances configuration
pgd PgdConfigurationPgd contains instructions to bootstrap this clusterTrue
pgdProxy PGDProxyConfigurationDeprecated: This field is deprecated, will be removed in future versions.
connectivity ConnectivityConfigurationConfigures the connectivity of the PGDGroup, like services
and certificates that will be used.
True
failingFinalizerTimeLimitSeconds integerThe amount of seconds that the operator will wait in case of a failing finalizer.
A finalizer is considered failing when the operator cannot reach any nodes of the PGDGroup
300

PGDGroupStatus

PGDGroupStatus defines the observed state of PGDGroup

Appears in:

FieldDescriptionRequiredDefaultValidation
latestGeneratedNode integerID of the latest generated node (used to avoid node name clashing)
phase OperatorPhaseThe initialization phase of this cluster
phaseDetails stringThe details of the current phase
phaseTroubleshootHints stringPhaseTroubleshootHints general troubleshooting indications for the given phase
phaseType PhaseTypePhaseType describes the phase category.Enum: [action wait fail]
conditions Condition arrayConditions for PGDGroup object
nodes NodeSummary arrayThe list of summaries for the nodes in the group
backup BackupStatusThe node that is taking backups of this PGDGroup
restore RestoreStatusThe status of the restore process
PGD PGDStatusLast known status of PGD
connMgr ConnMgrStatus arrayLast known status of Connection Manager
CNP CNPStatusLast known status of CNP
connectivity ConnectivityStatusLast known status of Connectivity
pause PauseStatusLast known status of Pause
image ImageStatusLast known status of used image
plugins PluginStatusPlugin Last known status of the plugins
managedRolesStatus ManagedRolesManagedRolesStatus reports the state of the managed roles in the group

PGDNodeGroupEntry

PGDNodeGroupEntry shows information about the node groups available in the PGD configuration

Appears in:

FieldDescriptionRequiredDefaultValidation
name stringName is the name of the node groupTrue
uuid stringUUID is the UUID of the group
enableRouting booleanEnableRouting is true is the node group allows routing
enableRaft booleanEnableRaft is true if the node group has a subgroup raft instance
routeWriterMaxLag integerRouteWriterMaxLag Maximum lag in bytes of the new write candidate to be
selected as write leader, if no candidate passes this, there will be no writer
selected automatically
routeReaderMaxLag integerRouteReaderMaxLag Maximum lag in bytes for node to be considered viable
read-only node
routeWriterWaitFlush booleanRouteWriterWaitFlush Whether to wait for replication queue flush before
switching to new leader when using bdr.routing_leadership_transfer()
connMgrReadWriteMaxClientConn integerConnMgrReadWriteMaxClientConn maximum read-write client connections allowed,
connMgrReadWriteMaxServerConn integerConnMgrReadWriteMaxServerConn maximum read-write connections that will be opened to server
connMgrReadOnlyMaxClientConn integerConnMgrReadOnlyMaxClientConn maximum read-only client connections allowed
connMgrReadOnlyMaxServerConn integerConnMgrReadOnlyMaxServerConn maximum read-only connections that will be opened to server
connMgrReadWriteConsensusTimeout integerConnMgrReadWriteConsensusTimeout how long to wait on loss of consensus before read-write
connections are no longer accepted
connMgrReadOnlyConsensusTimeout integerConnMgrReadOnlyConsensusTimeout how long to wait on loss of consensus before read-only
connections are no longer accepted
connMgrUseHTTPS booleanConnMgrUseHTTPS indicates whether to use HTTPS for connection manager communication

PGDNodeGroupSettings

PGDNodeGroupSettings contains the settings of the PGD Group

Appears in:

FieldDescriptionRequiredDefaultValidation
routeWriterMaxLag integerRouteWriterMaxLag Maximum lag in bytes of the new write candidate to be
selected as write leader, if no candidate passes this, there will be no writer
selected automatically
Defaults to -1
-1
routeReaderMaxLag integerRouteReaderMaxLag Maximum lag in bytes for node to be considered viable
read-only node
Defaults to -1
-1
routeWriterWaitFlush booleanRouteWriterWaitFlush Whether to wait for replication queue flush before
switching to new leader when using bdr.routing_leadership_transfer()
Defaults to false
false
connMgrReadWriteMaxClientConn integerConnMgrReadWriteMaxClientConn maximum read-write client connections allowed,
Defaults to -1 to use PGD default
-1
connMgrReadWriteMaxServerConn integerConnMgrReadWriteMaxServerConn maximum read-write connections that will be opened to server
Defaults to -1 to use PGD default
-1
connMgrReadOnlyMaxClientConn integerConnMgrReadOnlyMaxClientConn maximum read-only client connections allowed
Defaults to -1 to use PGD default
-1
connMgrReadOnlyMaxServerConn integerConnMgrReadOnlyMaxServerConn maximum read-only connections that will be opened to server
Defaults to -1 to use PGD default
-1
connMgrReadWriteConsensusTimeout integerConnMgrReadWriteConsensusTimeout the duration in seconds for how long to wait on loss of consensus before read-write
connections are no longer accepted in seconds, must be between 0 and 86400.
Defaults to 0
0Maximum: 86400
Minimum: 0
connMgrReadOnlyConsensusTimeout integerConnMgrReadOnlyConsensusTimeout the duration in seconds for how long to wait on loss of consensus before read-only
connections are no longer accepted in seconds, must be between 0 and 86400.
Defaults to 0
0Maximum: 86400
Minimum: 0

PGDProxyConfiguration

PGDProxyConfiguration defines the configuration of PGD Proxy Those settings are only applicable to PGD 5

Appears in:

FieldDescriptionRequiredDefaultValidation
imageName stringName of the PGDProxy container image
logLevel stringThe PGD Proxy log level, one of the following values: error, warning, info (default), debug, traceEnum: [error warning info debug trace]
logEncoder stringThe format of the log outputEnum: [text json]
proxyAffinity AffinityProxyAffinity/Anti-affinity rules for pods
proxyNodeSelector object (keys:string, values:string)ProxyNodeSelector rules for pods
proxyTolerations Toleration arrayProxyTolerations rules for pods
proxyResources ResourceRequirementsDefines the resources assigned to the proxy. If not defined uses defaults requests and limits values.

PGDProxySettings

PGDProxySettings contains the settings of the proxy

Deprecated: This field is deprecated, will be removed in future versions.

Appears in:

FieldDescriptionRequiredDefaultValidation
fallbackGroups string arrayFallbackGroups is the list of groups the proxy should forward connection to
when all the data nodes of this PGD group are not available
Deprecated: This field is deprecated, will be removed in future versions.
maxClientConn integerMaxClientConn maximum number of connections the proxy will accept.
Deprecated: This field is deprecated, will be removed in future versions.
maxServerConn integerMaxServerConn maximum number of connections the proxy will make to the
Postgres node.
Deprecated: This field is deprecated, will be removed in future versions.
serverConnTimeout integerServerConnTimeout connection timeout for server connections in seconds.
Deprecated: This field is deprecated, will be removed in future versions.
serverConnKeepalive integerServerConnKeepalive keepalive interval for server connections in seconds.
Deprecated: This field is deprecated, will be removed in future versions.
fallbackGroupTimeout integerFallbackGroupTimeout the interval after which the routing falls back
to one of the fallback_groups.
Deprecated: This field is deprecated, will be removed in future versions.
consensusGracePeriod integerConsensusGracePeriod the duration in seconds for which proxy continues to route even upon loss of a Raft leader.
If set to 0s, proxy stops routing immediately.
Deprecated: This field is deprecated, will be removed in future versions.
enableReadNodeRouting booleanEnableReadNodeRouting is the switch to control whether the proxy will route queries to read nodes through
read_listen_port or not. By default it is false
Deprecated: This field is deprecated, will be removed in future versions.

PGDRaftStatus

Underlying type: string

PGDRaftStatus indicates a known status of the PGDRaft

Appears in:

FieldDescription
OKPGDRaftConsensusStatusOk indicates that the raft consensus is working correctly
CRITICALPGDRaftConsensusStatusCritical indicates that the raft consensus is not ready
UNKNOWNPGDRaftConsensusStatusUnknown indicates that the raft consensus status is unknown
WARNINGPGDRaftConsensusStatusWarning is a warning that an election may be in progress

PGDRoutingStatus

Underlying type: string

PGDRoutingStatus represents the status of the connection managers routing

Appears in:

FieldDescription
globalRoutingToGlobalWriteLead indicates that the connection managers on group's nodes will route traffic to
the global group write leader
currentRoutingToCurrentWriteLead indicates that the connection managers on group's nodes will route traffic to
the current group write leader
notDetectedRoutingNotDetected indicates that the operator could not detect where the
connection managers on group's nodes are routing traffic to

PGDStatus

PGDStatus any relevant status for the operator about PGD

Appears in:

FieldDescriptionRequiredDefaultValidation
raftConsensusLastChangedStatus PGDRaftStatusRaftConsensusLastChangedStatus indicates the latest reported status from bdr.monitor_group_raft
raftConsensusLastChangedMessage stringRaftConsensusLastChangedMessage indicates the latest reported message from bdr.monitor_group_raft
raftConsensusLastChangedTimestamp stringRaftConsensusLastChangedTimestamp indicates when the status and message were first reported
nodeGroup PGDNodeGroupEntryNodeGroup is the status of the node group associated with the PGDGroup
globalNodeGroup PGDNodeGroupEntryGlobalNodeGroup is the status of the global node group
globalWriteLeadLastDetected stringGlobalWriteLeadLastDetected indicates global writelead detected in latest reconcile loop
only available if subgroup routing is disabled
writeLeadLastDetected stringWriteLeadLastDetected indicates subgroup writelead detected in latest reconcile loop
routingStatus PGDRoutingStatusRoutingStatus indicates where the connection managers on group's nodes will route traffic to
extensionVersion stringExtensionVersion is the pgd extension version detected on the raft lead node

ParentGroupConfiguration

ParentGroupConfiguration contains the topology configuration of PGD

Appears in:

FieldDescriptionRequiredDefaultValidation
name stringName of the parent groupTrueMinLength: 1
create booleanCreate is true when the operator should create the parent
group if it doesn't exist
false

PauseStatus

PauseStatus contains the information of group hibernating

Appears in:

FieldDescriptionRequiredDefaultValidation
active booleanActive indicates the PGDGroup is either:
- in process of pausing
- already paused
- in process of resuming
instances integerInstances is the number of paused PGD instances
lastStartedTime TimeLastStartedTime is the last time the PGDGroup started pausing
lastCompletedTime TimeLastCompletedTime is last time the PGDGroup completed pausing
lastResumeStartedTime TimeLastResumeStartedTime is the last time the PGDGroup started resuming
lastResumeCompletedTime TimeLastCompletedTime is last time the PGDGroup completed resuming

PgdConfiguration

PgdConfiguration is the configuration of the PGD group structure

Appears in:

FieldDescriptionRequiredDefaultValidation
parentGroup ParentGroupConfigurationParentGroup configures the topology of the PGD groupTrue
groupJoinMethod JoinMethodGroupJoinMethod defines the method in case of cross region join, this option
is mandatory for the non-initial data group ( groups with spec.pgd.parentGroup.create=false).
For initial group or witness group, it will be enforced to logical.
Enum: [logical physical]
discovery ConnectionString arrayThe parameters we will use to connect to a node belonging
to the parent PGD group.
Even if provided, the following parameters will be overridden with default values:
application_name, sslmode, dbname and user.
The following parameters should not be provided nor used, as they are not even
overridden with defaults:sslkey, sslcert, sslrootcert
discoveryJob DiscoveryJobConfigDiscoveryJob the configuration of the PGD Discovery job{ delay:10 retries:30 timeout:300 }
databaseName stringName of the database used by the application. Default: app.app
ownerName stringName of the owner of the database in the instance to be used
by applications. Defaults to the value of the database key.
ownerCredentialsSecret LocalObjectReferenceName of the secret containing the initial credentials for the
owner of the user database. If empty a new secret will be
created from scratch
proxySettings PGDProxySettingsProxySettings Configuration for the proxy
Deprecated: This field is deprecated, will be removed in future versions.
Starting from PGD 6, the embedded connection manager replaces the external proxy.
nodeGroupSettings PGDNodeGroupSettingsConfiguration for the PGD Group
globalRouting booleanGlobalRouting is true when global routing is enabled, and in this
case the connection managers on group's nodes will route traffic to
the global group write leader instead of the local group write leader
false
mutations SQLMutationsList of SQL mutations to apply to the node group

PhaseType

Underlying type: string

PhaseType describes the type of the OperatorPhase

Appears in:

FieldDescription
actionPhaseTypeAction triggers a reconciliation for a pkg
waitPhaseTypeWait the phase is waiting for an external resource to complete an action
failPhaseTypeFail the operator is failing, most likely requires a manual intervention

PluginConfigurationSpec

PluginConfigurationSpec defines the desired state of client configuration.

Appears in:

FieldDescriptionRequiredDefaultValidation
serverAddress stringServerAddress is the address of the Klio server in the format host:port or hostTrueMinLength: 1
tier1 Tier1PluginConfigurationTier1 is the Tier 1 configuration
tier2 Tier2PluginConfigurationTier2 is the Tier 2 configuration
serverSecretName stringServerSecretName is the name of the secret containing the server TLS certificateTrueMinLength: 1
pprof booleanPprof enables the pprof endpoint for performance profiling
mode ServerModeMode selects the operation mode of the server.TruestandardEnum: [standard read-only]
clusterName stringClusterName is the name of the PostgreSQL cluster we are connecting to.
This field is optional in templates as the operator will set it automatically.
containers Container arrayContainers allows defining a list of containers that will be merged with the Klio sidecar containers.
This enables users to customize the sidecars with additional environment variables, volume mounts,
resource limits, and other container settings without polluting the PostgreSQL container environment.
Merge behavior:
- Containers are matched by name (klio-plugin, klio-wal, klio-restore)
- User customizations serve as the base
- Klio required values (name, args, CONTAINER_NAME env var) always override user values
- User-defined environment variables and volume mounts are preserved
- Template defaults are applied only for fields not set by the user or Klio
MaxItems: 3

PluginStatus

PluginStatus contains the status of the plugins and managed plugins

Appears in:

FieldDescriptionRequiredDefaultValidation
barmanCloud BarmanCloudPluginStatusBarmanCloud stored the barman cloud plugin status
klio KlioPluginStatusKlio stored the klio plugin status

PreProvisionedCertificate

PreProvisionedCertificate contains the data needed to supply a pre-generated certificate

Appears in:

FieldDescriptionRequiredDefaultValidation
secretRef stringSecretRef a name pointing to a secret that contains a tls.crt and tls.key

RecoverabilityPointsByMethod

Underlying type: Time

RecoverabilityPointsByMethod contains the first recoverability points for a given backup method

Appears in:

ReplicationCertificateStatus

ReplicationCertificateStatus encapsulate the certificate status

Appears in:

FieldDescriptionRequiredDefaultValidation
name stringName is the name of the certificate
hash stringHash is the hash of the configuration for which it has been generated
isReady booleanReady is true when the certificate is ready
preProvisioned booleanPreProvisioned is true if the certificate is preProvisioned

Restore

Restore configures the restore of a PGD group from an object store

Appears in:

FieldDescriptionRequiredDefaultValidation
volumeSnapshots VolumeSnapshotsConfigurationThe configuration for volumeSnapshot restore
barmanObjectStore BarmanObjectStoreConfigurationThe configuration for the barman-cloud tool suite
plugin PluginConfigurationPlugin contains the configuration for plugin used to restore
recoveryTarget RecoveryTargetBy default, the recovery process applies all the available
WAL files in the archive (full recovery). However, you can also
end the recovery as soon as a consistent state is reached or
recover to a point-in-time (PITR) by specifying a RecoveryTarget object,
as expected by PostgreSQL (i.e., timestamp, transaction Id, LSN, ...).
More info: https://www.postgresql.org/docs/current/runtime-config-wal.html#RUNTIME-CONFIG-WAL-RECOVERY-TARGET
serverNames string arrayThe list of server names to be used as a recovery origin. One
of these servers will be elected as the seeding one when evaluating
the recovery target, this option is only used when restore from barmanObjectStore.

RestoreStatus

RestoreStatus contains the current status of the restore process

Appears in:

FieldDescriptionRequiredDefaultValidation
serverName stringThe name of the server to be restored
VolumeSnapshots VolumeSnapshotRestoreStatus arrayselected volumeSnapshots to restore

RootDNSConfiguration

RootDNSConfiguration describes how the FQDN for the resources should be generated

Appears in:

FieldDescriptionRequiredDefaultValidation
domain stringContains the domain name of by all services in the PGDGroup. It is responsibility of the user to ensure that the
value specified here matches with the rendered nodeServiceTemplate and groupServiceTemplate
hostSuffix stringContains an optional suffix to add to all the service names in the PGDGroup. The meaning of this setting it to
allow the user to easily mark all the services created in a location for routing purpose
(i.e., add a generic rule to CoreDNS to rewrite some service suffixes as local)
additional DNSConfiguration arrayAdditionalDNSConfigurations adds more possible FQDNs for the resources

SQLMutation

SQLMutation is a series of SQL statements to apply atomically

Appears in:

FieldDescriptionRequiredDefaultValidation
isApplied string arrayList of boolean-returning SQL queries. If any of them returns
false the mutation will be applied
TrueMinItems: 1
exec string arrayList of SQL queries to be executed to apply this mutationTrueMinItems: 1
type SQLMutationTypeType determines when the SQLMutation occurs.
'always': reconcile the mutation at each reconciliation cycle
'beforeSubgroupRaft': are executed only before the subgroupRaft is enabled
If not specified, the Type defaults to 'always'.
alwaysEnum: [always beforeSubgroupRaft writeLeader]

SQLMutationType

Underlying type: string

SQLMutationType a supported type of SQL Mutation

Appears in:

FieldDescription
alwaysSQLMutationTypeAlways tries to reconcile the mutation at each reconciliation cycle
beforeSubgroupRaftSQLMutationTypeBeforeSubgroupRaft are executed only before the subgroupRaft is enabled
writeLeaderSQLMutationTypeWriteLeader are executed only after raft Consensus and execute on write leader

SQLMutations

Underlying type: SQLMutation

SQLMutations A list of SQLMutation

Appears in:

FieldDescriptionRequiredDefaultValidation
isApplied string arrayList of boolean-returning SQL queries. If any of them returns
false the mutation will be applied
TrueMinItems: 1
exec string arrayList of SQL queries to be executed to apply this mutationTrueMinItems: 1
type SQLMutationTypeType determines when the SQLMutation occurs.
'always': reconcile the mutation at each reconciliation cycle
'beforeSubgroupRaft': are executed only before the subgroupRaft is enabled
If not specified, the Type defaults to 'always'.
alwaysEnum: [always beforeSubgroupRaft writeLeader]

ScheduledBackupSpec

ScheduledBackupSpec defines the desired state of ScheduledBackup

Appears in:

FieldDescriptionRequiredDefaultValidation
suspend booleanIf this backup is suspended or not
immediate booleanIf the first backup has to be immediately start after creation or not
schedule stringThe schedule does not follow the same format used in Kubernetes CronJobs
as it includes an additional second specifier,
see https://pkg.go.dev/github.com/robfig/cron#hdr-CRON_Expression_Format
True
backupOwnerReference stringIndicates which ownerReference should be put inside the created backup resources.
- none: no owner reference for created backup objects (same behavior as before the field was introduced)
- self: sets the Scheduled backup object as owner of the backup
- cluster: set the cluster as owner of the backup
noneEnum: [none self cluster]
target BackupTargetThe policy to decide which instance should perform this backup. If empty,
it defaults to cluster.spec.backup.target.
Available options are empty string, primary and prefer-standby.
primary to have backups run always on primary instances,
prefer-standby to have backups run preferably on the most updated
standby, if available. For PGD groups, this field is ignored and the backup will always
run on the primary instance as there is no standby in the node cluster.
Enum: [primary prefer-standby]
method BackupMethodThe backup method to be used, possible options are barmanObjectStore,
volumeSnapshot and plugin. Defaults to: barmanObjectStore.
barmanObjectStoreEnum: [barmanObjectStore volumeSnapshot plugin]
pluginConfiguration BackupPluginConfigurationConfiguration parameters passed to the plugin managing this backup
online booleanWhether the default type of backup with volume snapshots is
online/hot (true, default) or offline/cold (false)
Overrides the default setting specified in the cluster field '.spec.backup.volumeSnapshot.online'
onlineConfiguration OnlineConfigurationConfiguration parameters to control the online/hot backup with volume snapshots
Overrides the default settings specified in the cluster '.backup.volumeSnapshot.onlineConfiguration' stanza

ScheduledBackupStatus

ScheduledBackupStatus contains the status of the scheduled backup

Appears in:

FieldDescriptionRequiredDefaultValidation
method BackupMethodMethod is the backup method used to take the backup
name stringName is the name of the scheduled backup
hash stringHash is the hash of the scheduled backup configuration

ServerCertConfiguration

ServerCertConfiguration contains the information to generate the certificates for the nodes

Appears in:

FieldDescriptionRequiredDefaultValidation
caCertSecret stringCACertSecret is the secret of the CA to be injected into the CloudNativePG
ServerCASecret configuration
True
certManager CertManagerTemplateThe cert-manager template used to generate the certificatesTrue

ServiceTemplate

ServiceTemplate is a structure that allows the user to set a template for the Service generation.

Appears in:

FieldDescriptionRequiredDefaultValidation
metadata MetadataRefer to Kubernetes API documentation for fields of metadata.
spec ServiceSpecSpecification of the desired behavior of the service.
More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#spec-and-status
True
updateStrategy ServiceUpdateStrategyUpdateStrategy indicates how to update the services generated by this template.patchEnum: [patch replace]

ServiceUpdateStrategy

Underlying type: string

ServiceUpdateStrategy defines the type for updating LoadBalancers. Allowed values are "patch" and "replace".

Appears in:

FieldDescription
patchServiceUpdateStrategyPatch indicates to update existing services with a PATCH request
replaceServiceUpdateStrategyReplace indicates to update existing LoadBalancer services by recreating the service
ServiceUpdateStrategyReplace should be used for LoadBalancer services created in AWS.

TLSConfiguration

TLSConfiguration is the configuration of the TLS infrastructure used by PGD to connect to the nodes

Appears in:

FieldDescriptionRequiredDefaultValidation
mode TLSModeTrueverify-caEnum: [verify-ca verify-full require]
serverCert ServerCertConfigurationThe configuration for the server certificatesTrue
clientCert ClientCertConfigurationThe configuration for the client certificatesTrue

TLSMode

Underlying type: string

TLSMode describes which mode should be used for the node to node communications

Appears in:

FieldDescription
verify-fullVerifyFull verifies that the certificate is signed by the passed CA
and the server host name matches the certificate
verify-caVerifyCA verifies that the certificate is signed by the passed CA
requireRequire requires TLS but do not perform any certificate validation

VolumeSnapshotRestoreStatus

VolumeSnapshotRestoreStatus the volumeSnapshot to restore

Appears in:

FieldDescriptionRequiredDefaultValidation
snapshotName stringSnapshotName is the snapshot name to restore
pvcRole stringPVCRole is the pvcRole snapshot to restore
tablespaceName stringTablespaceName is the tablespace name the snapshot
belongs to, if the pvcRole is PG_TABLESPACE

VolumeSnapshotsConfiguration

VolumeSnapshotsConfiguration contains the configuration for the volumeSnapshots restore

Appears in:

FieldDescriptionRequiredDefaultValidation
selector LabelSelectorLabel selector used to select the volumeSnapshot to restoreTrue

CertificateKeystores

CertificateKeystores configures additional keystore output formats to be created in the Certificate's output Secret.

Appears in:

FieldDescriptionRequiredDefaultValidation
jks JKSKeystoreJKS configures options for storing a JKS keystore in the
spec.secretName Secret resource.
pkcs12 PKCS12KeystorePKCS12 configures options for storing a PKCS12 keystore in the
spec.secretName Secret resource.

CertificateList

CertificateList is a list of Certificates

FieldDescriptionRequiredDefaultValidation
apiVersion stringcert-manager.io/v1True
kind stringCertificateListTrue
metadata ListMetaRefer to Kubernetes API documentation for fields of metadata.True

CertificatePrivateKey

CertificatePrivateKey contains configuration options for private keys used by the Certificate controller. This allows control of how private keys are rotated.

Appears in:

FieldDescriptionRequiredDefaultValidation
rotationPolicy PrivateKeyRotationPolicyRotationPolicy controls how private keys should be regenerated when a
re-issuance is being processed.
If set to Never, a private key will only be generated if one does not
already exist in the target spec.secretName. If one does exists but it
does not have the correct algorithm or size, a warning will be raised
to await user intervention.
If set to Always, a private key matching the specified requirements
will be generated whenever a re-issuance occurs.
Default is 'Never' for backward compatibility.
encoding PrivateKeyEncodingThe private key cryptography standards (PKCS) encoding for this
certificate's private key to be encoded in.
If provided, allowed values are PKCS1 and PKCS8 standing for PKCS#1
and PKCS#8, respectively.
Defaults to PKCS1 if not specified.
Enum: [PKCS1 PKCS8]
algorithm PrivateKeyAlgorithmAlgorithm is the private key algorithm of the corresponding private key
for this certificate. If provided, allowed values are either RSA,Ed25519 or ECDSA
If algorithm is specified and size is not provided,
key size of 256 will be used for ECDSA key algorithm and
key size of 2048 will be used for RSA key algorithm.
key size is ignored when using the Ed25519 key algorithm.
Enum: [RSA ECDSA Ed25519]
size integerSize is the key bit size of the corresponding private key for this certificate.
If algorithm is set to RSA, valid values are 2048, 4096 or 8192,
and will default to 2048 if not specified.
If algorithm is set to ECDSA, valid values are 256, 384 or 521,
and will default to 256 if not specified.
If algorithm is set to Ed25519, Size is ignored.
No other values are allowed.

CertificateSpec

CertificateSpec defines the desired state of Certificate. A valid Certificate requires at least one of a CommonName, DNSName, or URISAN to be valid.

Appears in:

FieldDescriptionRequiredDefaultValidation
subject X509SubjectFull X509 name specification (https://golang.org/pkg/crypto/x509/pkix/#Name).
commonName stringCommonName is a common name to be used on the Certificate.
The CommonName should have a length of 64 characters or fewer to avoid
generating invalid CSRs.
This value is ignored by TLS clients when any subject alt name is set.
This is x509 behaviour: https://tools.ietf.org/html/rfc6125#section-6.4.4
duration DurationThe requested 'duration' (i.e. lifetime) of the Certificate. This option
may be ignored/overridden by some issuer types. If unset this defaults to
90 days. Certificate will be renewed either 2/3 through its duration or
renewBefore period before its expiry, whichever is later. Minimum
accepted duration is 1 hour. Value must be in units accepted by Go
time.ParseDuration https://golang.org/pkg/time/#ParseDuration
renewBefore DurationHow long before the currently issued certificate's expiry
cert-manager should renew the certificate. The default is 2/3 of the
issued certificate's duration. Minimum accepted value is 5 minutes.
Value must be in units accepted by Go time.ParseDuration
https://golang.org/pkg/time/#ParseDuration
dnsNames string arrayDNSNames is a list of DNS subjectAltNames to be set on the Certificate.
ipAddresses string arrayIPAddresses is a list of IP address subjectAltNames to be set on the Certificate.
uris string arrayURIs is a list of URI subjectAltNames to be set on the Certificate.
emailAddresses string arrayEmailAddresses is a list of email subjectAltNames to be set on the Certificate.
secretName stringSecretName is the name of the secret resource that will be automatically
created and managed by this Certificate resource.
It will be populated with a private key and certificate, signed by the
denoted issuer.
IMPORTANT: this field was required in the original cert-manager API declaration
True
keystores CertificateKeystoresKeystores configures additional keystore output formats stored in the
secretName Secret resource.
issuerRef ObjectReferenceIssuerRef is a reference to the issuer for this certificate.
If the kind field is not set, or set to Issuer, an Issuer resource
with the given name in the same namespace as the Certificate will be used.
If the kind field is set to ClusterIssuer, a ClusterIssuer with the
provided name will be used.
The name field in this stanza is required at all times.
True
isCA booleanIsCA will mark this Certificate as valid for certificate signing.
This will automatically add the cert sign usage to the list of usages.
usages KeyUsage arrayUsages is the set of x509 usages that are requested for the certificate.
Defaults to digital signature and key encipherment if not specified.
Enum: [signing digital signature content commitment key encipherment key agreement data encipherment cert sign crl sign encipher only decipher only any server auth client auth code signing email protection s/mime ipsec end system ipsec tunnel ipsec user timestamping ocsp signing microsoft sgc netscape sgc]
privateKey CertificatePrivateKeyOptions to control private keys used for the Certificate.
encodeUsagesInRequest booleanEncodeUsagesInRequest controls whether key usages should be present
in the CertificateRequest
revisionHistoryLimit integerrevisionHistoryLimit is the maximum number of CertificateRequest revisions
that are maintained in the Certificate's history. Each revision represents
a single CertificateRequest created by this Certificate, either when it
was created, renewed, or Spec was changed. Revisions will be removed by
oldest first if the number of revisions exceeds this number. If set,
revisionHistoryLimit must be a value of 1 or greater. If unset (nil),
revisions will not be garbage collected. Default value is nil.
ExclusiveMaximum: false

JKSKeystore

JKSKeystore configures options for storing a JKS keystore in the spec.secretName Secret resource.

Appears in:

FieldDescriptionRequiredDefaultValidation
create booleanCreate enables JKS keystore creation for the Certificate.
If true, a file named keystore.jks will be created in the target
Secret resource, encrypted using the password stored in
passwordSecretRef.
The keystore file will only be updated upon re-issuance.
A file named truststore.jks will also be created in the target
Secret resource, encrypted using the password stored in
passwordSecretRef containing the issuing Certificate Authority
True
passwordSecretRef SecretKeySelectorPasswordSecretRef is a reference to a key in a Secret resource
containing the password used to encrypt the JKS keystore.
True

KeyUsage

Underlying type: string

KeyUsage specifies valid usage contexts for keys. See: https://tools.ietf.org/html/rfc5280#section-4.2.1.3

https://tools.ietf.org/html/rfc5280#section-4.2.1.12

Valid KeyUsage values are as follows: "signing", "digital signature", "content commitment", "key encipherment", "key agreement", "data encipherment", "cert sign", "crl sign", "encipher only", "decipher only", "any", "server auth", "client auth", "code signing", "email protection", "s/mime", "ipsec end system", "ipsec tunnel", "ipsec user", "timestamping", "ocsp signing", "microsoft sgc", "netscape sgc"

Validation:

  • Enum: [signing digital signature content commitment key encipherment key agreement data encipherment cert sign crl sign encipher only decipher only any server auth client auth code signing email protection s/mime ipsec end system ipsec tunnel ipsec user timestamping ocsp signing microsoft sgc netscape sgc]

Appears in:

FieldDescription
signingUsageSigning is a key usage flag
digital signatureUsageDigitalSignature is a key usage flag
content commitmentUsageContentCommitment is a key usage flag
key enciphermentUsageKeyEncipherment is a key usage flag
key agreementUsageKeyAgreement is a key usage flag
data enciphermentUsageDataEncipherment is a key usage flag
cert signUsageCertSign is a key usage flag
crl signUsageCRLSign is a key usage flag
encipher onlyUsageEncipherOnly is a key usage flag
decipher onlyUsageDecipherOnly is a key usage flag
anyUsageAny is a key usage flag
server authUsageServerAuth is a key usage flag
client authUsageClientAuth is a key usage flag
code signingUsageCodeSigning is a key usage flag
email protectionUsageEmailProtection is a key usage flag
s/mimeUsageSMIME is a key usage flag
ipsec end systemUsageIPsecEndSystem is a key usage flag
ipsec tunnelUsageIPsecTunnel is a key usage flag
ipsec userUsageIPsecUser is a key usage flag
timestampingUsageTimestamping is a key usage flag
ocsp signingUsageOCSPSigning is a key usage flag
microsoft sgcUsageMicrosoftSGC is a key usage flag
netscape sgcUsageNetscapeSGC is a key usage flag

LocalObjectReference

LocalObjectReference is a reference to an object in the same namespace as the referent. If the referent is a cluster-scoped resource (e.g. a ClusterIssuer), the reference instead refers to the resource with the given name in the configured 'cluster resource namespace', which is set as a flag on the controller component (and defaults to the namespace that cert-manager runs in).

Appears in:

FieldDescriptionRequiredDefaultValidation
name stringName of the resource being referred to.
More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names
True

ObjectReference

ObjectReference is a reference to an object with a given name, kind and group.

Appears in:

FieldDescriptionRequiredDefaultValidation
name stringName of the resource being referred to.True
kind stringKind of the resource being referred to.
group stringGroup of the resource being referred to.

PKCS12Keystore

PKCS12Keystore configures options for storing a PKCS12 keystore in the spec.secretName Secret resource.

Appears in:

FieldDescriptionRequiredDefaultValidation
create booleanCreate enables PKCS12 keystore creation for the Certificate.
If true, a file named keystore.p12 will be created in the target
Secret resource, encrypted using the password stored in
passwordSecretRef.
The keystore file will only be updated upon re-issuance.
A file named truststore.p12 will also be created in the target
Secret resource, encrypted using the password stored in
passwordSecretRef containing the issuing Certificate Authority
True
passwordSecretRef SecretKeySelectorPasswordSecretRef is a reference to a key in a Secret resource
containing the password used to encrypt the PKCS12 keystore.
True

PrivateKeyAlgorithm

Underlying type: string

PrivateKeyAlgorithm represent a private key algorithm

Validation:

  • Enum: [RSA ECDSA Ed25519]

Appears in:

FieldDescription
RSARSAKeyAlgorithm denotes the RSA private key type.
ECDSAECDSAKeyAlgorithm denotes the ECDSA private key type.
Ed25519Ed25519KeyAlgorithm denotes the Ed25519 private key type.

PrivateKeyEncoding

Underlying type: string

PrivateKeyEncoding represent a private key encoding

Validation:

  • Enum: [PKCS1 PKCS8]

Appears in:

FieldDescription
PKCS1PKCS1 key encoding will produce PEM files that include the type of
private key as part of the PEM header, e.g. BEGIN RSA PRIVATE KEY.
If the keyAlgorithm is set to 'ECDSA', this will produce private keys
that use the BEGIN EC PRIVATE KEY header.
PKCS8PKCS8 key encoding will produce PEM files with the BEGIN PRIVATE KEY
header. It encodes the keyAlgorithm of the private key as part of the
DER encoded PEM block.

PrivateKeyRotationPolicy

Underlying type: string

PrivateKeyRotationPolicy denotes how private keys should be generated or sourced when a Certificate is being issued.

Appears in:

SecretKeySelector

SecretKeySelector is a reference to a specific 'key' within a Secret resource. In some instances, key is a required field.

Appears in:

FieldDescriptionRequiredDefaultValidation
name stringName of the resource being referred to.
More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names
True
key stringThe key of the entry in the Secret resource's data field to be used.
Some instances of this field may be defaulted, in others it may be
required.

X509Subject

X509Subject Full X509 name specification

Appears in:

FieldDescriptionRequiredDefaultValidation
organizations string arrayOrganizations to be used on the Certificate.
countries string arrayCountries to be used on the Certificate.
organizationalUnits string arrayOrganizational Units to be used on the Certificate.
localities string arrayCities to be used on the Certificate.
provinces string arrayState/Provinces to be used on the Certificate.
streetAddresses string arrayStreet addresses to be used on the Certificate.
postalCodes string arrayPostal codes to be used on the Certificate.
serialNumber stringSerial number to be used on the Certificate.